{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-06T18:49:33.820","vulnerabilities":[{"cve":{"id":"CVE-2024-42048","sourceIdentifier":"cve@mitre.org","published":"2025-08-07T17:15:27.060","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"OpenOrange Business Framework version 1.15.5 installs to a directory with overly permissive access control, allowing all authenticated users to write to the installation path. In combination with the application's behavior of loading DLLs from this location, this allows for DLL hijacking and may result in arbitrary code execution and privilege escalation."},{"lang":"es","value":"OpenOrange Business Framework 1.15.5 proporciona a los usuarios sin privilegios acceso de escritura al directorio de instalación."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":2.5}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-284"}]}],"references":[{"url":"https://attack.mitre.org/techniques/T1574/001","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/windows/win32/api/libloaderapi/nf-libloaderapi-loadlibrarya","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/windows/win32/api/libloaderapi/nf-libloaderapi-loadlibraryexa","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/windows/win32/dlls/dynamic-link-library-search-order","source":"cve@mitre.org"},{"url":"https://landings.openorange.com/l/erp-peru-a.html","source":"cve@mitre.org"},{"url":"https://raw.githubusercontent.com/securityadvisories/Security-Advisories/refs/heads/main/Advisories/Blaze%20Information%20Security%20-%20DLL%20Hijacking%20in%20OpenOrange%20Business%20Framework%20Allows%20Arbitrary%20Code%20Execution%20and%20Potential%20Privilege%20Escalation.txt","source":"cve@mitre.org"},{"url":"https://resources.infosecinstitute.com/topic/dll-hijacking","source":"cve@mitre.org"},{"url":"https://support.microsoft.com/en-us/topic/secure-loading-of-libraries-to-prevent-dll-preloading-attacks-d41303ec-0748-9211-f317-2edc819682e1","source":"cve@mitre.org"},{"url":"https://www.openorange.com","source":"cve@mitre.org"}]}}]}